­Y±zµLªk¬Ý¨ì§¹¾ã­¶­±¡A½Ð«ö¦¹³B¡Ghere
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 ¶³ºÝÀ³¥Î( ¸ê°T¦w¥þ¡B¤j¼Æ¾ÚBig Data¡BService )
10:10-10:50 K1 ¶³ºÝ®É¥N¤jÁͶաA
´x´¤°ê»Ú¶³ºÝ¦w¥þµo®i­«ÂI
­^°ê¼Ð·Ç¨ó·|¥xÆW¤À¤½¥q
»Z¾ð²± / Á`¸g²z
501
11:00-11:40 K2 ¶³ºÝ¸ê¦w·s¬D¾Ô¡A¥ø·~¥Í¦s¤j§@¾Ô ! ÁͶլì§Þ / §d»à­ë / ¸ê²`²£«~¸g²z 501
11:50-12:30 K3 ¸ê°T¦w¥þ¦A¶i¤Æ - ´¼¼z«¬¦w¥þÁp¨¾ McAfee
¨H§Ó©ú (Alex Shen) / ¸ê²`§Þ³N¸g²z
501
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
  Web Security( APT, DDoS, IPS, ¶³ºÝ¨­¤À»{ÃÒ,NGF)
13:30-14:10 S1-1 [¤¤¤åºtÁ¿] ¤J«I¨¾¿mªº·s«äºû
New Security Model. Before, During and After the attack
Henry Ong / Cisco Sourcefire Regional SE Director - ASEAN and North Asia 501
14:30-15:10 S1-2 ºô¾Ô¦M¾÷ - ¬°¦ó¥Ø¼ÐÁ`¬O§Ú¡H Nexusguard / ­]ªF¼Ý / ¬ã¨s­û 501
15:30-16:10 S1-3 ¶³ºÝ¶B´ÛÀË´ú( Fraud Detection ) Keypasco Founder & CEO ªL­ZÁo¥ý¥Í 501
16:30-17:10 S1-4 Blue Coat¦p¦ó¨ó§U§A¥´³Ó³o³õµLÁnªº¾Ôª§ Blue Coat Taiwan
´¿¨}Â@ / §Þ³NÁ`ºÊ
501
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 Content Security ( Source Code, ¶l¥ó½]®Ö,¹q¤lñ³¹, ¸ê®Æ«OÅ@..)
13:30-14:10 S2-1 ¡y¶³ºÝ®ü¶q¸ê®Æ¤Uªº¶l¥ó½]®ÖÂkÀÉ·s§Þ³N¡z ºñ¦â¹Bºâ / ³¯¥ü¹ç / °ÆÁ`¸g²z 503
14:30-15:10 S2-2 ¤½¶}ª÷Æ_§Þ³Nµo®i»PÀ³¥ÎÁÍ¶Õ ¤¤µØ¹q«H¬ã¨s°| / ³\ºðªÛ
¸ê³q¦w¥þ¬ã¨s©Ò¬ã¨s­û
503
15:30-16:10 S2-3 TrustView¥þ¤è¦ì¸Ñ¨M¤è®×-«OÅ@¾÷±K¡B
­Ó¸ê¡BSource Code
ÀuºÓ¸ê°T / ³¯«~¿« / §Þ³N¦æ¾P¸g²z 503
16:30-17:10 S2-4 °T®§¦w¥þ¡G§A©Ò¤£ª¾¹Dªº¥¿¸q»P¨¸´c§ð¨¾¾Ô Openfind / ªL®a¥¿ / ²£«~ºÞ²z³¡ ¸g²z 503
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 Infra, Web Application Security ( NGF, ¥D¾÷¦s¨ú¦æ¬°±±¨î, TCP/IP¨ì Web ¨¾Å@)
13:30-14:10 S3-1 ¦¸¥@¥N«Â¯Ù¨¾Å@
¬ð¯}¨F½c¨¾¿mªºª¼ÂI¤Î°g«ä
FireEye / ªLªÃ©¾ / ¸ê²`§Þ³NÅU°Ý 509
14:30-15:10 S3-2 2014·s¥@¥N¶³ºÝªA°È¸ê¦w¨¾¿m·sµ¦²¤ Palo Alto Networks
ÂÅ³Õ«Û / §Þ³N¸g²z
509
15:30-16:10 S3-3 ¨M¾Ô¶³ºÝ - DDoS ¨¾¿mªº³Ì¨ÎWeb Security¸Ñ¨M¤è®× Akamai Technologies
¶À¶}¦L / ¸ê²`¤uµ{®v
509
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 Storage / ³Æ´©³Æ¥÷ (ÀÉ®×,¸ê®Æ®w¦s¨ú½]®Ö,µwºÐ¸ê®Æ¾P·´,«Ê¥]Â^¨ú¶}©ñ¥­¥x)
13:30-14:10 S4-1 ¨¾¸ê®Æ¥~¬ª­·ÀI¡AALog´¦¶}ÀÉ®×/ DB / NetAPP¦s¨ú½]®Ö§ð²¤ ¤¤µØ¼Æ¦ì¬ì§Þ
±i²ú«Ì / ALog ²£«~¸g²z
521
14:30-15:10 S4-2 ¤@Áû»ù­È¨â»õ¤¸ªº¥¼Ãz¼u
µwºÐ¸ê®Æ¾P·´°h³õ¾÷¨î
U-Reach ¦öµØ¬ì§Þ
Àd«Ø¿« / ±M®×¸g²z
521
15:30-16:10 S4-3 momentum¡A¤é¥»¯«¬Þ¯Å¸ê¦w¨úÃÒ¥­¥x Terilogy Co., Ltd
±i§g / ¨Æ·~¾Ô²¤³¡ Specialist
521
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
Networking Security (APT¡BDDoS §ðÀ»»P¨¾¿m)
10:10-10:50 K4 ºô¸ô¸ê°T¾Ô¨ÓÁ{ ¬F©²»P¥Á¶¡¸ê¦wÁp¨¾ ¦æ¬F°|¸ê³q¦w¥þ¿ì¤½«Ç / §d±Ò¤å / °Æ¥D¥ô 501
11:00-11:40 K5 ºÖº¸¼¯´µ¥S§Ì©Ê®æ®t²§¡G
¥D°Ê¦¡¥ý¶i«Â¯Ù¤§°lÂÜ»P°»´ú§Þ³N¤À¨É
ªü½X¬ì§Þ³Ð¿ì¤H
Proofpoint §Þ³N°ÆÁ` / ¶ÀÄ£¤å ³Õ¤h
501
11:50-12:30 K6 ±q2020ºô¸ôÃöÁä³ø§i¡A
¬Ý¥ø·~APT¨¾¿mµ¦²¤
ÁͶլì§Þ / §d©vÀM / §Þ³NÅU°Ý 501
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 Web Security ( APT §Þ³N»PºÞ²z, DDoS ¦p¦ó©è¾×? Botnet ¨¾½dµ¦²¤¤j¤½¶})
13:30-14:10 S5-1 ¦¸¥@¥N«Â¯Ù¨¾Å@
¹h¹D»PºÝÂIªº§¹¬üÁp¨¾
FireEye / ¼B«T¶¯ / §Þ³NÅU°Ý 501
14:30-15:10 S5-2 Proofpoint APT¨¾¿m -
­Ý®e¡u§Þ³N»PºÞ²z¡v»Ý¨D
¬ü°Óªü½XÃÒÂI°ê»ÚªÑ¥÷¦³­­¤½¥q
¥xÆW¤À¤½¥q / ®}©ú¹F / Á`¸g²z
501
15:30-16:10 S5-3 [¤¤¤åºtÁ¿] How To Extend Data Center Protection Beyond Anti-DDoS Juniper Networks
Simon Tong / ¸ê¦w±M®a
501
16:30-17:10 S5-4 Botnet°í¤£¥iºR¡H
§ðÀ»¤âªk¤Î¨¾½dµ¦²¤¤j¸Ñ±K
ÁͶլì§Þ / §õ°ö¹ç / ¸ê²`§Þ³N±M®×¸g²z 501
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 Content Security ( ¸ê®Æ¥~¬ª¨¾Å@, ¦æ°Ê¶l¥óºÞ±±, ª«Ápºô¸ê¦w, Big Data ¤j¼Æ¾Ú¤ÀªR»P¹w´ú´¦ÅS)
13:30-14:10 S6-1 ±qÁú°ê«H¥Î§½KCB­Ó¸ê¥~¬ª¨Æ¥ó
¬Ý¤º³¡«Â¯Ù¤Îº|¬}¨¾Å@
WareValley / Kenny Kim / COO 503
14:30-15:10 S6-2 ¶l¥óAPT¨¾¿m»P¦æ°Ê¶l¥óºÞ±± Cellopoint / ¤ý«Û¶¯ / ¦æ¾P·~°ÈÁ`ºÊ 503
15:30-16:10 S6-3 ¾Ö©êª«Ápºô¡A¸ê¦w¥ý¦æ -
³nµw¾ã¦X¡Bµ¦²¤§G§½·s«äºû
Âîº~¬ì§Þ / ³¢©v¿« / Á`¸g²z 503
16:30-17:10 S6-4 ¦p¦ó±q¦w¥þªº¨¤«×¨Ó¬Ý¤j¼Æ¾Ú ¦wùÖ¸ê°TªÑ¥÷¦³­­¤½¥q
Ĭ©ÉµX / ²£«~¸g²z
503
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 Infra, Web Application Security ( AP T¨¾½u§G§½, º¯³z´ú¸Õ, PCI DSS 3.0 ¦w¥þ§Þ³NÀ³¥Î¡K)
13:30-14:10 S7-1 APT ¦Ê®aª§»ï¡A¥¿½T§G§½¨¾¿m "³Ì«á¨¾½u" Lastline, Inc.
¿Û¨K³Ç / ¸ê²`¦w¥þ§Þ³NÅU°Ý
510
14:30-15:10 S7-2 ¦p¦ó¾ã¦X ISO 27001:2013 »P PCI DSS 3.0 ¥HÀ³¥I«H¥Î¥d¸ê®Æ¦w¥þ¦X³W­n¨D Nexusguard Consulting
Âů§Á¾ / ¸ê¦w¸g²z
510
15:30-16:10 S7-3 ¥þ²y¸ê¦wÁͶջP APT ¨¾¿m§Þ³N Check Point / ³¯¼s¿Ä / §Þ³NÁ`ºÊ 510
16:30-17:10 S7-4 ±q¸ê¦w°·¶E¤Îº¯³z´ú¸Õ½Í¥ø·~©¿²¤
ªº¸ê¦wº|¬}
¤¤µØ¹q«H¸ê¦wºÊ±±¤¤¤ß
¬I¦Æ¾± / º¯³z´ú¸Õ¹Î¶¤­t³d¤H
510
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
Endpoint Security ºÝÂI¨¾Å@ ( Log ¥[¸Ñ±K, Access Control , ±b¸¹±K½X«OÅ@, ­Ó¸ê½LÂI..)
13:30-14:10 S8-1 ¯¦¤å( HIBUN ) :
¤é¥»No.1ªº¸ê°T¬ªº|¨¾Å@¸Ñ¨M¤è®×¡I
¤é¥ß¨È²Ó¨È Hitachi
±i©v§» / ²£«~¸g²z
521
14:30-15:10 S8-2 ¶³ºÝ¡B¥æ©öºô¯¸±b¸¹±K½X¤§®zÂI¤ÀªR¡B
®i¥Ü»P«OÅ@
¶ø¼Ö¬ì§Þ / ¤ý°òÑÏ / Á`¸g²z 521
15:30-16:10 S8-3 ­Ó¸ê½LÂI¤TÂIÆF Üc«O¸ê°T / ªô§Ó³Ç / ±M®×¸g²z 521
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
¤½¥qªv²z-ªk³W¿í´` (¥ø·~¥þ­±¸ê¦wÀË´ú¡BŲÃÑ»P¯SÅvºÞ²z)
10:10-10:50 K7 2013­Ó¸êªk¤j¨Æ¬ö»P¥¼¨Ó®i±æ °]¹Îªk¤H¸ê°T¤u·~µ¦¶i·|
¬ì§Þªk«ß¬ã¨s©Ò
¿½´Q¤¯ / «ß®v
«ß¬ã¨s­û / «ß®v /
»OÆW­Ó¤H¸ê®Æ«OÅ@»PºÞ²z¨î«×
(TPIPAS)±M·~ÅçÃÒ¤H­û
501
11:00-11:40 K8 [¤¤­^¤åºtÁ¿]
¥Ñ°ê»Ú¸ê¦wÀË´ú¤ÀªR¡Bºò«æÀ³ÅܤÎŲÃѸgÅç¬Ý¥Ø«e¥ø·~¦p¦ó¸Ñ?
¤é¯q½ÆÂøªº¸ê¦w¤Î¬ª±K°ÝÃD
AccessData §Þ³NÁ`ºÊ (Jason Mical)
ų¯u¼Æ¦ì ¸ê²`ÅU°Ý ¶À·q³Õ
501
11:50-12:30 K9 ¤º³¡ºÞ²zªºª¼ÂI - ¯SÅv±b¸¹ ¤O®®¸ê°T / ´^°ê¹F / ¸g²z 501
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
 Risk Security / service (¥¼ª¾´c·Nµ{¦¡¨Æ«e¨¾¿m°»´ú, Àç·~¯µ±Kªk»P½]®ÖºÞ²z,¥¨¶q¶l¥ó½]®Ö)
13:30-14:10 S9-1 [¤¤­^¤åºtÁ¿]
­±¹ïºò«æ¸ê¦w¨Æ¥ó -
¦p¦ó¦³®Ä§Ö³tªº¥þ­±°»´ú¤Î¤ÏÀ³
AccessData §Þ³NÁ`ºÊ (Jason Mical) ,
ìD¯u¼Æ¦ì ¸ê²`ÅU°Ý ¶À·q³Õ
503
14:30-15:10 S9-2 Àç·~¯µ±KºÞ²z»P½]®Ö¤u¨ãÀ³¥Î ¤¤µØ¼Æ¦ì¬ì§Þ¥ø·~¸ê®Æ«OÅ@¬ã¨s¤p²Õ
§d¼Ý³Ô / ÅU°Ý
503
15:30-16:10 S9-3 ¥¨¶q¶l¥ó½]®Ö­y¸ñ»P­·ÀI±±ºÞ¤§µo®iÁͶÕ
~ BIG DATA Email Discovery Solution
¨ä¹F¬ì§Þ / ªL¨|«H¥ý¥Í 503
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
BYOD ºÝÂI³]³ÆºÞ²z / Wireless Security ( ºÞ²z»P DLP ­ÝÅU)
10:10-10:50 K10 ²°T¶BÄF§ðÀ»¨Æ¥ó­åªR ¤º¬F³¡Äµ¬F¸p¦D¨ÆÄµ¹î§½ 165 ±M½u /
³Å®¶­ì / ²Õªø
510
11:00-11:40 K11 ¶}±Ò¥Î¤á¶}¤ß¡A¸ê¦w©ñ¤ßªº¦æ°ÊIT¤§ªù! MobileIron / Anthony Li
¸ê²`§Þ³N¤uµ{®v
510
11:50-12:30 K12 ¦³®Ä¨¾¿m DDoS §ðÀ»»P­°§C­·ÀI ¸g½n¸ê°T C2 Square / ´^³Ó©¾ / §Þ³Nªø 510
®É¶¡ ³õ¦¸ ijÃD ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ ·|ij«Ç
BYOD ºÝÂI³]³ÆºÞ²z / Wireless Security
13:30-14:10 S10-1 BYOD±z·Ç³Æ¦n¤F¶Ü?
CA¥ø·~¦æ°ÊºÞ²z¤è®×
CA Technologies / ¤ý²MŲ / ¸ê²`ÅU°Ý 510
14:30-15:10 S10-2 ¦æ°Ê¤ä¥I»P¦w¥þ Keypasco Founder & CEO ªL­ZÁo¥ý¥Í 510
15:30-16:10 S10-3 Mobile DLP º[¶³ºÝ¦æ°Ê¸Ë¸m¦s¨ú±±ºÞ
¤§¾ã¦X»P©µ¦ù
LetMobile »P Ericom¥xÆW°ÏÁ`¥N²z
º~»â°ê»Ú²£«~§Þ³N¸g²z ¶Àº~©z
510
¦¹¶l¥ó¬O¨t²Î¦Û°Ê¶Ç°e¡A½Ð¤Åª½±µ¦^ÂЦ¹¶l¥ó¡A­Y±z¤£Ä@·N¦A¦¬¨ì¸ê¦w¤Hªº¥ô¦ó°T®§¡A½Ð«ö¦¹